Midterm 2 Chapter 12 Flashcards
Generally Accepted Privacy Principles
- Management
- Notice
- Choice and consent
- Collection
- Use, retention, and disposal
- Access
- Disclosure to third parties
- Security
- Quality
- Monitoring and enforcement
What is the difference between privacy and confidentiality?
Privacy: personal information the company collects from suppliers, customers, and employees
Confidentiality: intellectual property that is crucial to the company’s success
What actions must be taken to protect both confidentiality and privacy?
- Identify/classify the information to be protected
- Encryption
- Control access to the information
- Train employees to properly handle the information
What is the strictest and most far-reaching privacy regulation?
European Union’s General Data Privacy Regulation (GDRP)
What does the GDPR do?
- Proactive approach to privacy “Privacy by Design”
- Requires organizations to notify regulators with 72 hours of discovering a breach
- Rights: access to data about you, correction of errors, deletion of personal data, and revocation of consent to sell/share information
Identity Theft
The unauthorized use of someone’s personal information for the perpetrator’s benefit
Encryption
The process of transforming normal content, plaintext, into unreadable gibberish, ciphertext
Decryption
Transforming ciphertext into plaintext
Generally, how does decryption work?
The computer first divides the ciphertext into 512-bit blocks and then applies the decryption key to each block
What factors determine the strength of any encryption system?
- Key length
- Encryption algorithm
- Policies for managing the cryptographic keys
Policies for managing the cryptographic keys
- Don’t store keys in a browser or any other file that other users of the system can readily access
- Use a strong/long passphrase to protect the keys
- Keys should only be issued to employees who handle sensitive data
- Keys should be promptly evoked when an employee leaves or a key has been compromised
How many keys does symmetric encryption have?
One key